Contents

In a peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. This system is not based with having a file server or centralized management source. A peer-to-peer network sets all connected computers equal; they all share the same abilities to use resources available on the network.[3]

Network operating systems can be based on a client/server architecture in which a server enables multiple clients to share resources.[1] Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system provides the mechanism to integrate all the components on a network to allow multiple users to simultaneously share the same resources regardless of physical location.[3][4]

In a client/server network security issues may evolve at three different locations: the client, the network, and the server. All three points need to be monitored for unauthorized activity and need to be secured against hackers or eavesdroppers.

'The Client

The client is the end user of the network and needs to be secured the most. The client end usually exposes data through the screen of the computer. Client connections to server should be secured through passwords and upon leaving their workstations clients should make sure that their connection to the server is securely cut off in order to make sure that no hackers or intruders are able to reach the server data. Not only securing the workstations connection to the server is important but also securing the files on the workstation (client) is important as it ensures that no hackers are able to reach the system. Another possibility is that of introducing a virus or running unauthorized software on the client workstation thus threatening the entire information bank at the server (Exforsys Inc., 2007).

The users themselves could also be a security threat if they purposely leave their IDs logged in or use easy IDs and passwords to enable hacking. Users may also be sharing their passwords in order to give the hackers access to confidential data (Wilson, Lin, & Craske, 1999). This can be overcome by giving passwords to each client and regularly asking clients to change their passwords. Also passwords should be checked for guessability and for their strength and uniqueness.

The Network

The network allows transmission of data from the clients to the server. There are several points on the network where a hacker could eavesdrop or steal important packets of information. These packets may contain important confidential data such as passwords or company details. It is important that these networks are secured properly to keep unauthorized professionals away from all the data stored on the server. This can be done by encrypting important data being sent on the network. However, encryption may not be the only possible way of protecting networks as hackers can work their way around encryption. Another method could be conducting security audits regularly and ensuring identification and authorization of individuals at all points along the network. This should discourage potential hackers (Wilson, Lin, & Craske, 1999). Making the entire environment difficult to impersonate also makes sure that the clients are reaching the true files and applications on the server and that the server is providing information to authorized personnel only.

The Server

The server can be secured by placing all the data in a secure, centralized location that is protected through permitting access to authorized personnel only. Virus protection should also be available on server computers as neal vast amounts of data can be infected. Regular upgrades should be provided to the servers as the software and the applications need to be updated. Even the entire body of data on a server could be encrypted in order to make sure that reaching the data would require excessive time and effort (Wilson, Neal, & Craske, 1999).

The Open Networking Lab, ON.Lab, today launched the revolutionary open source SDN Open Network Operating System (ONOS) on behalf of the ONOS community of partners, contributors and end-users. The open source software will be released and ...

SHENZHEN, China -- Huawei, together with Open Network Operating System (ONOS) and Open Networking Foundation (ONF), announced that together they will build an open and innovative SDN industry ecosystem, enabling operators to accelerate SDN ...

The two companies announced March 30 that Supermicro will integrate Arista's networking switch products and EOS+ network operating system into its server and storage hardware to create rack-level offerings that officials said will drive the adoption of ...

Microsoft, Dell and Facebook are among a group of vendors who have come together with data centre operators to develop software intended to abstract chunks of network silicon (switches, typically) from the network operating system that runs on them.

Meanwhile, Juniper's OCX1100 brite box is an Alpha Networks hardware design that runs a "lightweight" version of Juniper's own network operating system, JunOS. All three vendors allow other operating systems to be loaded via the Open Network Install ...

The Huawei IP + optical and Transport SDN applications are based on the Open Network Operating System (ONOS) and are the first of their kind to be developed through the operator-oriented SDN open source platform. This demonstration marks a key ...

The Open Compute Project has accepted Big Switch's Open Network Linux contribution as the project's reference network operating system. Created to support commercial projects, as well as to be a base hardware-testing reference platform for DIY ...

The demonstrations at OFC are believed to be the first ones industry-wide that were developed through the open source Open Network Operating System group. They included a bandwidth-on-demand demonstration, and perhaps more significant, ...

Limit to books that you can completely read online
Include partial books (book previews)